tailieunhanh - Eloba chaotic keystream cipher: implementation, analysis and performance
In our paper, we describe eLoBa architecture, based on Lorenz chaotic system. We also analyze one important security issue of keystream cryptographic systems, the cycle length. Finally, we compare eLoBa against several cryptographic systems, for its performance on a authentication service implementation on a resource constraint smart-card. | International Journal of Computer Networks and Communications Security C VOL. 2, NO. 3, MARCH 2014, 119–124 Available online at: ISSN 2308-9830 N C S eLoBa Chaotic Keystream Cipher: Implementation, Analysis and Performance RUI MIGUEL SILVA1, RUI GUSTAVO CRESPO2 1 Polytechnic Institute of Beja (IPBeja)/Lab UbiNET/INESC-ID, Department of Engineering, Beja, Portugal 2 Technical University of Lisbon (UTL)/INESC-ID, Department of Electrical and Computer Engineering, Lisbon, Portugal E-mail: 1ruisilva@, 2(Posthumous Co-Author) ABSTRACT Many computer-based security services are required by modern society, such as cipher/decipher, authentication and integrity. Security services are implemented by cryptographic systems, such as symmetric (block and keystream) and asymmetric. We focus our attention to a special sort of keystream cryptographic systems, based on chaotic systems. In our paper, we describe eLoBa architecture, based on Lorenz chaotic system. We also analyze one important security issue of keystream cryptographic systems, the cycle length. Finally, we compare eLoBa against several cryptographic systems, for its performance on a authentication service implementation on a resource constraint smart-card. Keywords: Chaotic Cipher, Smart-Card Authentication, Keystream Cipher, Security and Privacy, Cryptography. 1 INTRODUCTION Cryptography for resource constrained devices is a challenge with increasing interest due to the rise of Internet of Thing, the applications of Wireless Sensor Networks, or the massive usage of smartcards, among other areas. However, most of the cryptographic algorithms demand for computational resources that could not be available in such devices. One important cryptographic service is Authentication and chaos cryptography is low resource consumer. In this paper we merge this two facts and evaluate the results in real world smart-card implementation. 2 CHAOTIC KEYSTREAM CIPHER In this section we briefly present
đang nạp các trang xem trước